Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

On the performance of non-orthogonal multiple access (NOMA) using FPGA

10.11591/ijece.v10i2.pp2151-2163
Mohamad Abdulrahman Ahmed , Khalid F. Mahmmod , Mohammed M. Azeez
In this paper,  non-orthogonal multiple access (NOMA) is designed and implemented for the fifth generation (5G) of multi-user wireless communication.  Field-programmable gate array (FPGA) is considered for the implementation of this technique for two users. NOMA is applied in downlink phase of the base-station (BS) by applying power allocation mechanism for far and near users, in which one signal contains the superposition of two scaled signals depending on the distance of each user from the BS.  We assume an additive white Gaussian noise (AWGN) channel for each user in the presence of the interference due to the non-orthogonality between the two users’ signals. Therefore, successive-interference cancellation (SIC) is exploited to remove the undesired signal of the other user. The outage probability and the bit-error rate performance are presented over different signal-to-interference-plus-noise ratio (SINR). Furthermore, Monte-Carlo simulations via Matlab are utilized to verify the results obtained by FPGA, which show exact-close match.
Volume: 10
Issue: 2
Page: 2151-2163
Publish at: 2020-04-01

Efficiency enhancement using optimized static scheduling technique in TSCH networks

10.11591/ijece.v10i2.pp1952-1962
Manjunath G. Asuti , Prabhugoud I. Basarkod
In recent times, the reliable and real-time data transmission becomes a mandatory requirement for various industries and organizations due to the large utilization of Internet of Things (IoT) devices. However, the IoT devices need high reliability, precise data exchange and low power utilization which cannot be achieved by the conventional Medium Access Control (MAC) protocols due to link failures and high interferences in the network. Therefore, the Time-Slotted Channel Hopping (TSCH) networks can be used for link scheduling under the IEEE 802.15.4e standard. In this paper, we propose an Optimized Static Scheduling Technique (OSST) for the link scheduling in IEEE 802.15.4e based TSCH networks. In OSST the link schedule is optimized by considering the packet latency information during transmission by checking the status of the transmitted packets as well as keeping track of the lost data packets from source to destination nodes. We evaluate the proposed OSST model using 6TiSCH Simulator and compare the different performance metrics with Simple distributed TSCH Scheduling.
Volume: 10
Issue: 2
Page: 1952-1962
Publish at: 2020-04-01

Traveling wave based fault location for power transmission lines using morphological filters and clarke modal components

10.11591/ijece.v10i2.pp1122-1134
Elmahdi Khoudry , Abdelaziz Belfqih , Jamal Boukherouaa , Faissal Elmariami
This article presents a fast and accurate fault location approach for power transmission lines based on the theory of traveling waves. In fact, when faults occur, they give rise to transient voltages and currents that propagate at a speed close to that of light along the transmission line as traveling waves. Moreover, according to the superposition theorem, each of these transients is a combination of a steady-state quantity and an incremental quantity. These transient signals measured at both ends of the line are first transformed to the Clarke (0-α-β components) components in order to categorize the type of faults, and then multi-scale morphological gradient filters are used to extract equivalent quantities to the incremental quantities to form what are called characteristic signals. These latter will be used to identify the fault location according to the proposed algorithm.
Volume: 10
Issue: 2
Page: 1122-1134
Publish at: 2020-04-01

A novel efficient multiple encryption algorithm for real time images

10.11591/ijece.v10i2.pp1327-1336
Shima Ramesh Maniyath , Thanikaiselvan V.
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
Volume: 10
Issue: 2
Page: 1327-1336
Publish at: 2020-04-01

Trust-based secure routing against lethal behavior of nodes in wireless adhoc network

10.11591/ijece.v10i2.pp1592-1598
Jyoti Neeli , N. K. Cauvery
Offering a secure communication in wireless adhoc network is yet an open-end problem irrespective of archives of existing literatures towards security enhancement. Inclination towards solving specific forms of attack in adhoc network is majorly seen as an existing trend which lowers the applicability of existing security solution while application environment or attack scenario is changed. Therefore, the proposed system implements an analytical secure routing modeling which performs consistent monitoring of the malicious behaviour of its neighboring node and formulates decision towards secure routing by the source nodes. Harnessing the potential ofconceptual probabilistic modeling, the proposed system is capable as well as applicable for resisting maximum number / types of threats in wireless network. The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.
Volume: 10
Issue: 2
Page: 1592-1598
Publish at: 2020-04-01

Approximating offset Curves using Bezier curves with high accuracy

10.11591/ijece.v10i2.pp1648-1654
Abedallah Rababah , Moath Jaradat
In this paper, a new method for the approximation of offset curves is presented using the idea of the parallel derivative curves. The best uniform approximation of degree 3 with order 6 is used to construct a method to find the approximation of the offset curves for Bezier curves. The proposed method is based on the best uniform approximation, and therefore; the proposed method for constructing the offset curves induces better outcomes than the existing methods.
Volume: 10
Issue: 2
Page: 1648-1654
Publish at: 2020-04-01

Integrated approach for efficient power consumption and resource allocation in MIMO-OFDMA

10.11591/ijece.v10i2.pp2069-2076
Archana B. , T. P. Surekha
The growing interest towards wireless communication advancement with smart devices has provided the desired throughput of wireless communication mechanisms. But, attaining high-speed data packets amenities is the biggest issue in different multimedia applications. Recently, OFDM has come up with the useful features for wireless communication however it faces interference issues at carrier level (intercarrier interferences). To resolve these interference issues in OFDM, various existing mechanisms were utilized cyclic prefix, but it leads to redundancy in transmitted data. Also, the transmission of this redundant data can take some more power and bandwidth. All these limitations factors can be removed from a parallel cancellation mechanism. The integration of parallel cancellation and Convolution Viterbi encoding and decoding in MIMO-OFDMA will be an effective solution to have high data rate which also associations with the benefits of both the architectures of MIMO and OFDMA modulation approaches. This paper deals with this integrated mechanism for efficient resource allocation and power consumption. For performance analysis, MIMO-OFDMA system is analyzed with three different approaches likeMIMO-OFDM system without parallel cancellation (MIMO-OFDMA-WPC), MIMO-OFDMA System with parallel cancellation (MIMO-OFDMA-PC) and proposed IMO-OFDMA system with parallel cancellation and Convolution Viterbi encoding/decoding (pMIMO-OFDMA-PC &CVed) for 4x4 transmitter and receiver. Through performance analysis, it is found that the proposed system achieved better resource allocation (bandwidth) with high data rate by minimized BER rate and achieved least power consumption with least BER.
Volume: 10
Issue: 2
Page: 2069-2076
Publish at: 2020-04-01

Quantification of operating reserves with high penetration of wind power considering extreme values

10.11591/ijece.v10i2.pp1693-1700
Johan S. Obando , Gabriel González , Ricardo Moreno
The high integration of wind energy in power systems requires operating reserves to ensure the reliability and security in the operation. The intermittency and volatility in wind power sets a challenge for day-ahead dispatching in order to schedule generation resources. Therefore, the quantification of operating reserves is addressed in this paper using extreme values through Monte-Carlo simulations. The uncertainty in wind power forecasting is captured by a generalized extreme value distribution to generate scenarios. The day-ahead dispatching model is formulated as a mixed-integer linear quadratic problem including ramping constraints. This approach is tested in the IEEE-118 bus test system including integration of wind power in the system. The results represent the range of values for operating reserves in day-ahead dispatching.
Volume: 10
Issue: 2
Page: 1693-1700
Publish at: 2020-04-01

An approach to designing and developing an LMS framework appropriate for young pupils

10.11591/ijece.v10i2.pp1577-1591
Radoslava Kraleva , Mehrudin Sabani , Velin Kralev , Dafina Kostadinova
The lifestyle of the new people generation, called in the scientific literature Generation Z, is closely related to the Internet, computer and information technology. Therefore, people and children belonging to this group can be viewed in terms of software technology as specific users who have high requirements regarding the functions and interface of the software applications, connectivity to social networks and instant communication via the Internet. This influenced not only on the teaching and learning methods but also on the software applications used in the learning process. In recent years, new theoretical teaching methods have emerged, and the number of electronic learning systems increased. However, students lack motivation for the learning process. This requires developing new conceptual models of training and learning software, tailored to the skills and preferences of the end-users. The young students up to 12 years of age: from kindergartens to preschools and primary schools are special users who have not been studied exhaustively. In order to present the problem related to the development of learning and training software thoroughly, the most commonly used standards and current trends, as well as the advantages and disadvantages of LMS platforms have been reviewed. Attention is drawn to the commonly used software design and development technologies. This is the reason to propose a strategy for developing a web-based e-learning management system according to the possibilities of young pupils as a specific user. Having in mind this strategy we described a software architecture, based on SCORM's specification, and we developed an LMS prototype. Its design was tailored to the skills of young children. The basic methodology used in the design and creation of the system we propose is user-centered design. The document is intended for developers, educators and scientists, studying child-computer interaction.
Volume: 10
Issue: 2
Page: 1577-1591
Publish at: 2020-04-01

Control of variable reluctance machine (8/6) by artificiel intelligence techniques

10.11591/ijece.v10i2.pp1893-1904
Mama Chouitek , Noureddine Benouzza , Benaissa Bekouche
The non-linearity of variable-Reluctance Machine (8/6) and the dependence of machine inductance on rotor position and applied current complicate the development of the control strategies of drives using variable-Reluctance Machine variable-Reluctance Machine (VRM). The classical-control algorithms for example of derived full proportional action may prove sufficient if the requirements on the accuracy and performance of systems are not too strict. In the opposite case and particularly when the controlled part is submitted to strong nonlinearity and to temporal variations, control techniques must be designed which ensure the robustness of the process with respect to the uncertainties on the parameters and their variations. These techniques include artificial-intelligence-based techniques constituted of neural networks and fuzzy logic. This technique has the ability to replace PID regulators by nonlinear ones using the human brain’s reasoning and functioning and is simulated by using MATLAB/Simulink software. Finally, by using obtained waveforms, these results will be compared.
Volume: 10
Issue: 2
Page: 1893-1904
Publish at: 2020-04-01

Compact wide stopband microstrip lowpass filter using polygon patches and meandered lines

10.11591/ijict.v9i1.pp24-30
Adel Musavy , Akram Sheikhi
In this paper, a low pass filter based on T-Shaped resonator is presented. The T-Shaped resonator consists of meandered lines and rectangular patches. Also, the LC model and transfer function of the proposed resonator is presented. For suppression of spurious harmonics, a bandstop structure consists of hexangular patches and open stubs has been utilized. Finally, the wide stopband microstrip lowpass filter with cutoff frequency 2.72 GHz has been simulated, fabricated and measured. The LPF has good characteristics such as wide stopband and insertion loss lower than 0.18 dB in the passband region. The rejection level is less than -20 dB from 2.98 up to 21.3 GHz. The filter size is 10.5 mm×12.7 mm, or 0.131 λg× 0.158 λg, where λg is the guided wavelength. The measured and simulated results of the filter is in good agreement with each other, which show the merits of low insertion loss and wide stopband.
Volume: 9
Issue: 1
Page: 24-30
Publish at: 2020-04-01

A hybrid approach for scheduling applications in cloud computing environment

10.11591/ijece.v10i2.pp1387-1397
Ahmed Subhi Abdalkafor , Khattab M. Ali Alheeti
Cloud computing plays an important role in our daily life. It has direct and positive impact on share and update data, knowledge, storage and scientific resources between various regions. Cloud computing performance heavily based on job scheduling algorithms that are utilized for queue waiting in modern scientific applications. The researchers are considered cloud computing a popular platform for new enforcements. These scheduling algorithms help in design efficient queue lists in cloud as well as they play vital role in reducing waiting for processing time in cloud computing. A novel job scheduling is proposed in this paper to enhance performance of cloud computing and reduce delay time in queue waiting for jobs. The proposed algorithm tries to avoid some significant challenges that throttle from developing applications of cloud computing. However, a smart scheduling technique is proposed in our paper to improve performance processing in cloud applications. Our experimental result of the proposed job scheduling algorithm shows that the proposed schemes possess outstanding enhancing rates with a reduction in waiting time for jobs in queue list.
Volume: 10
Issue: 2
Page: 1387-1397
Publish at: 2020-04-01

Antlion optimization algorithm for optimal non-smooth economic load dispatch

10.11591/ijece.v10i2.pp1187-1199
Thanh Pham Van , Vaclav Snasel , Thang Trung Nguyen
This paper presents applications of Antlion optimization algorithm (ALO) for handling optimal economic load dispatch (OELD) problems. Electricity generation cost minimization by controlling power output of all available generating units is a major goal of the problem. ALO is a metaheuristic algorithm based on the hunting process of Antlions. The effect of ALO is investigated by solving a 10-unit system. Each studied case has different objective function and complex level of restraints. Three test cases are employed and arranged according to the complex level in which the first one only considers multi fuel sources while the second case is more complicated by taking valve point loading effects into account. And, the third case is the highest challenge to ALO since the valve effects together with ramp rate limits, prohibited operating zones and spinning reserve constraints are taken into consideration. The comparisons of the result obtained by ALO and other ones indicate the ALO algorithm is more potential than most methods on the solution, the stabilization, and the convergence velocity. Therefore, the ALO method is an effective and promising tool for systems with multi fuel sources and considering complicated constraints.
Volume: 10
Issue: 2
Page: 1187-1199
Publish at: 2020-04-01

A review on vehicle to vehicle communication system applications

10.11591/ijeecs.v18.i1.pp188-198
Hussein Ali Ameen , Abd Kadir Mahamad , Sharifah Saon , Danial Md. Nor , Kareem Ghazi
The field of automated vehicle technology is developing rapidly developing. While it is likely to be many years before self-driving cars are commercially viable and used in a wide range of conditions by the general public, technological advances are speeding along the automated technology continuum towards this destination. Automated vehicle technologies troth with significant social benefits such as reduced injuries and deaths, increased road efficiency, mobility. Automated vehicles can improve traffic safety, balance traffic flows, maximize road usage by offering driver warnings and/or assuming vehicle control in dangerous situations, as well as provide motorists with the best end-to-end transportation experience and reduce emissions, which are the most important goals of modern smart traffic control infrastructures. Exchanging data and integration of such systems with Vehicle-to-Vehicle (V2V) may be a keystone to successful readying of vehicular ad-hoc networks (VANETs) and will simply be the following step of this evolution, with dynamic period of time data exchange between all the players of the traffic dominant system and fostering cooperative urban quality. One of the applications of this concept is to provide vehicles and roads with the ability to make road time more enjoyable and also to make roads safer. These applications are typical examples of what an Intelligent Transportation System (ITS) is called, whose objective is to improve security by using new information and communication technologies (NTIC). In this paper, we will focus on the study of the main component in ITS systems and present a review of the major V2V benefits related to driver safety by focusing primarily on the recent developments of these systems.
Volume: 18
Issue: 1
Page: 188-198
Publish at: 2020-04-01

Extended network and algorithm finding maximal flows

https://ijece.iaescore.com/index.php/IJECE/article/view/19883
Tran Ngoc Viet , Le Hong Dung
Graph is a powerful mathematical tool applied in many fields as transportation, communication, informatics, economy, In ordinary graph the weights of edges and vertexes are considered independently where the length of a path is the sum of weights of the edges and the vertexes on this path. However, in many practical problems, weights at a vertex are not the same for all paths passing this vertex, but depend on coming and leaving edges. The paper develops a model of extended network that can be applied to modelling many practical problems more exactly and effectively. The main contribution of this paper is algorithm finding maximal flows on extended networks.
Volume: 10
Issue: 2
Page: 1632-1640
Publish at: 2020-04-01
Show 1150 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration